Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 14:04
Behavioral task
behavioral1
Sample
edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe
-
Size
20KB
-
MD5
edbfed40da9442ab67ba9e6844220f35
-
SHA1
5d9fb8a081d08b150f6e12d887fbc07af63c1981
-
SHA256
a18deb168d4be28ca55cf495163e863ea045e1d75a8ca71abdf935c01c26b776
-
SHA512
9c6b2e7382605895b383b0337f913195e19482a5359ba4da65d59fa96866edf073cf1311204cbfefc23552d0a25365bb2e9831152a6dad9bd1f3da451b9e2a14
-
SSDEEP
384:dnH9Q30L6/6F3pkBqsXK1NSLbR+1i6PHDLL9w/xPnzypQ:dnH2EL6CZa8P1QhciuH3pw/lnC
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/4756-2-0x0000000013140000-0x0000000013151000-memory.dmp modiloader_stage2 -
resource yara_rule behavioral2/memory/4756-0-0x0000000013140000-0x0000000013151000-memory.dmp upx behavioral2/memory/3592-1-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/4756-2-0x0000000013140000-0x0000000013151000-memory.dmp upx behavioral2/memory/3592-4-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/3592-6-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/3592-9-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/3592-12-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4756 set thread context of 3592 4756 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 82 -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2848 sc.exe 2180 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3592 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4756 wrote to memory of 3592 4756 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 82 PID 4756 wrote to memory of 3592 4756 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 82 PID 4756 wrote to memory of 3592 4756 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 82 PID 4756 wrote to memory of 3592 4756 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 82 PID 4756 wrote to memory of 3592 4756 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 82 PID 3592 wrote to memory of 3668 3592 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 83 PID 3592 wrote to memory of 3668 3592 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 83 PID 3592 wrote to memory of 3668 3592 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 83 PID 3592 wrote to memory of 4224 3592 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 84 PID 3592 wrote to memory of 4224 3592 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 84 PID 3592 wrote to memory of 4224 3592 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 84 PID 4224 wrote to memory of 4916 4224 net.exe 87 PID 4224 wrote to memory of 4916 4224 net.exe 87 PID 4224 wrote to memory of 4916 4224 net.exe 87 PID 3668 wrote to memory of 4492 3668 net.exe 88 PID 3668 wrote to memory of 4492 3668 net.exe 88 PID 3668 wrote to memory of 4492 3668 net.exe 88 PID 3592 wrote to memory of 2848 3592 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 89 PID 3592 wrote to memory of 2848 3592 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 89 PID 3592 wrote to memory of 2848 3592 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 89 PID 3592 wrote to memory of 2180 3592 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 90 PID 3592 wrote to memory of 2180 3592 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 90 PID 3592 wrote to memory of 2180 3592 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 90 PID 3592 wrote to memory of 3376 3592 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 102 PID 3592 wrote to memory of 3376 3592 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 102 PID 3592 wrote to memory of 3376 3592 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\net.exenet stop wscsvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc4⤵
- System Location Discovery: System Language Discovery
PID:4492
-
-
-
C:\Windows\SysWOW64\net.exenet stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵
- System Location Discovery: System Language Discovery
PID:4916
-
-
-
C:\Windows\SysWOW64\sc.exesc delete wscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2848
-
-
C:\Windows\SysWOW64\sc.exesc delete sharedaccess3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2180
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.bat C:\Users\Admin\AppData\Local\Temp\edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.bat3⤵
- System Location Discovery: System Language Discovery
PID:3376
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69B
MD5e3b0a4ae48f7cfe95b51f8d3cfd329d0
SHA116d9435d895dcf1680baf5b8ebc6342f561af049
SHA25690423a49e145f44c6cefc80ba4351d04a4eaaee2b86e38aad1d9927fbad3d7bf
SHA5125abd674b6e8896bedacd7e0ae593d49771f5c5a036adab1963a37e38f5f2cf185b157d101e97c6e1572b5ae4dfcbfa0470871b2faa0a8d96c6dae19b1329b9f3